Table of Contents Author Guidelines Submit a Manuscript
Journal of Sensors
Volume 2017, Article ID 7864671, 16 pages
https://doi.org/10.1155/2017/7864671
Research Article

An Efficient Dynamic Trust Evaluation Model for Wireless Sensor Networks

1School of Computer Science and Engineering, Northeastern University, Shenyang, China
2Department of Network Information Center, Tonghua Normal University, Tonghua, China
3School of Computer Science and Technology, Dalian Neusoft University of Information, Dalian, China

Correspondence should be addressed to Zhengwang Ye; moc.621@911gnawgnehz

Received 7 April 2017; Accepted 25 September 2017; Published 24 October 2017

Academic Editor: Jaime Lloret

Copyright © 2017 Zhengwang Ye et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. R. D. Gomes, M. O. Adissi, T. A. da Silva, A. C. Filho, M. A. Spohn, and F. A. Belo, “Application of wireless sensor networks technology for induction motor monitoring in industrial environments,” in Intelligent Environmental Sensing, vol. 13 of Smart Sensors, Measurement and Instrumentation, pp. 227–277, Springer International Publishing, Cham, 2015. View at Publisher · View at Google Scholar
  2. M. M. Alam, D. Ben Arbia, and E. Ben Hamida, “Wearable wireless sensor networks for emergency response in public safety networks,” Wireless Public Safety Networks, pp. 63–94, 2016. View at Publisher · View at Google Scholar · View at Scopus
  3. M. Bhuiyan, G. Wang, J. Wu et al., “Dependable structural health monitoring using wireless sensor networks,” IEEE Transactions on Dependable and Secure Computing, pp. 1–47, 2015. View at Google Scholar
  4. T. Ojha, S. Misra, and N. S. Raghuwanshi, “Wireless sensor networks for agriculture: the state-of-the-art in practice and future challenges,” Computers and Electronics in Agriculture, vol. 118, pp. 66–84, 2015. View at Publisher · View at Google Scholar · View at Scopus
  5. G. Han, J. Jiang, L. Shu, J. Niu, and H.-C. Chao, “Management and applications of trust in wireless sensor networks: a survey,” Journal of Computer and System Sciences, vol. 80, no. 3, pp. 602–617, 2014. View at Publisher · View at Google Scholar · View at Scopus
  6. H. Modares, A. Moravejosharieh, R. Salleh, and J. Lloret, “Security overview of wireless sensor network,” Life Science Journal, vol. 10, no. 2, pp. 1627–1632, 2013. View at Google Scholar · View at Scopus
  7. R. Lacuesta, J. Lloret, M. Garcia, and L. Peñalver, “Two secure and energy-saving spontaneous ad-hoc protocol for wireless mesh client networks,” Journal of Network and Computer Applications, vol. 34, no. 2, pp. 492–505, 2011. View at Publisher · View at Google Scholar · View at Scopus
  8. R. Lacuesta, J. Lloret, M. Garcia, and L. Peñalver, “A secure protocol for spontaneous wireless Ad Hoc networks creation,” IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 4, pp. 629–641, 2013. View at Publisher · View at Google Scholar · View at Scopus
  9. J. Cordasco and S. Wetzel, “Cryptographic versus trust-based methods for MANET routing security,” Electronic Notes in Theoretical Computer Science, vol. 197, no. 2, pp. 131–140, 2008. View at Publisher · View at Google Scholar · View at Scopus
  10. M. Momani and S. Challa, “Survey of trust models in different network domains,” International Journal of Ad hoc, Sensor & Ubiquitous Computing, vol. 1, no. 3, pp. 1–19, 2010. View at Publisher · View at Google Scholar
  11. A. Boukerch, L. Xu, and K. EL-Khatib, “Trust-based security for wireless ad hoc and sensor networks,” Computer Communications, vol. 30, no. 11-12, pp. 2413–2427, 2007. View at Publisher · View at Google Scholar · View at Scopus
  12. F. Ishmanov, A. S. Malik, S. W. Kim, and B. Begalov, “Trust management system in wireless sensor networks: design considerations and research challenges,” Transactions on Emerging Telecommunications Technologies, vol. 26, no. 2, pp. 107–130, 2015. View at Publisher · View at Google Scholar
  13. Y. Liu, C.-X. Liu, and Q.-A. Zeng, “Improved trust management based on the strength of ties for secure data aggregation in wireless sensor networks,” Telecommunication Systems, vol. 62, no. 2, pp. 319–325, 2016. View at Publisher · View at Google Scholar · View at Scopus
  14. X. Anita, M. A. Bhagyaveni, and J. M. L. Manickam, “Collaborative lightweight trust management scheme for wireless sensor networks,” Wireless Personal Communications, vol. 80, no. 1, pp. 117–140, 2015. View at Publisher · View at Google Scholar · View at Scopus
  15. G. Rajeshkumar and K. R. Valluvan, “An Energy Aware Trust Based Intrusion Detection System with Adaptive Acknowledgement for Wireless Sensor Network,” Wireless Personal Communications, vol. 94, no. 4, pp. 1993–2007, 2016. View at Publisher · View at Google Scholar · View at Scopus
  16. Y. L. Sun, Z. Han, and K. J. R. Liu, “Defense of trust management vulnerabilities in distributed networks,” IEEE Communications Magazine, vol. 46, no. 2, pp. 112–119, 2008. View at Publisher · View at Google Scholar
  17. F. Ishmanov, S. W. Kim, and S. Y. Nam, “A robust trust establishment scheme for wireless sensor networks,” Sensors, vol. 15, no. 3, pp. 7040–7061, 2015. View at Publisher · View at Google Scholar · View at Scopus
  18. S. Ganeriwal and M. B. Srivastava, “Reputation-based frame-work for high integrity sensor networks,” in Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '04), pp. 66–77, October 2004. View at Scopus
  19. H. Chen, H. Wu, X. Zhou, and C. Gao, “Agent-based trust model in wireless sensor networks,” in Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD '07), pp. 119–124, IEEE, Qingdao, China, August 2007. View at Publisher · View at Google Scholar · View at Scopus
  20. R. A. Shaikh, H. Jameel, B. J. d'Auriol, H. Lee, S. Lee, and Y. Song, “Group-based trust management scheme for clustered wireless sensor networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 20, no. 11, pp. 1698–1712, 2009. View at Publisher · View at Google Scholar · View at Scopus
  21. J. Song, X. Li, J. Hu, G. Xu, and Z. Feng, “Dynamic trust evaluation of wireless sensor networks based on multi-factor,” in Proceedings of the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015, pp. 33–40, fin, August 2015. View at Publisher · View at Google Scholar · View at Scopus
  22. X. Li, F. Zhou, and J. Du, “LDTS: a lightweight and dependable trust system for clustered wireless sensor networks,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 6, pp. 924–935, 2013. View at Publisher · View at Google Scholar · View at Scopus
  23. D. He, C. Chen, S. Chan, J. Bu, and A. V. Vasilakos, “ReTrust: attack-resistant and lightweight trust management for medical sensor networks,” IEEE Transactions on Information Technology in Biomedicine, vol. 16, no. 4, pp. 623–632, 2012. View at Publisher · View at Google Scholar · View at Scopus
  24. R. Feng, X. Han, Q. Liu, and N. Yu, “A credible bayesian-based trust management scheme for wireless sensor networks,” International Journal of Distributed Sensor Networks, vol. 2015, Article ID 678926, 2015. View at Publisher · View at Google Scholar · View at Scopus
  25. G. Zhan, W. Shi, and J. Deng, “SensorTrust: a resilient trust model for wireless sensing systems,” Pervasive and Mobile Computing, vol. 7, no. 4, pp. 509–522, 2011. View at Publisher · View at Google Scholar · View at Scopus
  26. H.-H. Dong, Y.-J. Guo, Z.-Q. Yu, and C. Hao, “A wireless sensor networks based on multi-angle trust of node,” in Proceedings of the International Forum on Information Technology and Applications (IFITA '09), vol. 1, pp. 28–31, May 2009. View at Publisher · View at Google Scholar · View at Scopus
  27. J. Jiang, G. Han, F. Wang, L. Shu, and M. Guizani, “An efficient distributed trust model for wireless sensor networks,” IEEE Transactions on Parallel and Distributed Systems, 2014. View at Publisher · View at Google Scholar
  28. H. Rathore, V. Badarla, and S. Shit, “Consensus-aware sociopsychological trust model for wireless sensor networks,” ACM Transactions on Sensor Networks, vol. 12, no. 3, article no. 21, 2016. View at Publisher · View at Google Scholar · View at Scopus
  29. R. Feng, X. Xu, X. Zhou, and J. Wan, “A trust evaluation algorithm for wireless sensor networks based on node behaviors and D-S evidence theory,” Sensors, vol. 11, no. 2, pp. 1345–1360, 2011. View at Publisher · View at Google Scholar · View at Scopus
  30. T. Zhang, L. Yan, and Y. Yang, “Trust evaluation method for clustered wireless sensor networks based on cloud model,” Wireless Networks, pp. 1–21, 2016. View at Publisher · View at Google Scholar · View at Scopus
  31. S. Shen, L. Huang, E. Fan, K. Hu, J. Liu, and Q. Cao, “Trust dynamics in WSNs: an evolutionary game-theoretic approach,” Journal of Sensors, vol. 2016, Article ID 4254701, 10 pages, 2016. View at Publisher · View at Google Scholar
  32. J.-W. Ho, M. Wright, and S. K. Das, “Distributed detection of mobile malicious node attacks in wireless sensor networks,” Ad Hoc Networks, vol. 10, no. 3, pp. 512–523, 2012. View at Publisher · View at Google Scholar · View at Scopus
  33. C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” in Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications, pp. 113–127, May 2003. View at Publisher · View at Google Scholar
  34. Y. L. Sun, Z. Han, W. Yu, and K. J. R. Liu, “A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks,” in Proceedings of the INFOCOM 2006: 25th IEEE International Conference on Computer Communications, esp, April 2006. View at Publisher · View at Google Scholar · View at Scopus
  35. A. Jøsang and R. Ismail, “The Beta Reputation System,” in Proceedings of the 15th Bled Electronic Commerce Conference (Bled EC), pp. 324–337, Slovenia, 2002.
  36. E. Elnahrawy and B. Nath, “Cleaning and querying noisy sensors,” in Proceedings of the the 2nd ACM international conference, p. 78, San Diego, CA, USA, September 2003. View at Publisher · View at Google Scholar
  37. S. Mi, H. Han, C. Chen, J. Yan, and X. Guan, “A secure scheme for distributed consensus estimation against data falsification in heterogeneouswireless sensor networks,” Sensors, vol. 16, no. 2, 2016. View at Publisher · View at Google Scholar · View at Scopus
  38. B. Zhao, H. Jing-Sha E, Y. Zhang X et al., “Analysis of multi-factor in trust evaluation of open network,” Journal of Shandong University, vol. 49, no. 9, pp. 103–108, 2014. View at Google Scholar
  39. R. R. Yager, “Induced aggregation operators,” Fuzzy Sets and Systems, vol. 137, no. 1, pp. 59–69, 2003. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  40. R. Fullér and P. Majlender, “An analytic approach for obtaining maximal entropy OWA operator weights,” Fuzzy Sets and Systems, vol. 124, no. 1, pp. 53–57, 2001. View at Publisher · View at Google Scholar · View at MathSciNet
  41. X.-Y. Li and X.-L. Gui, “Cognitive model of dynamic trust forecasting,” Ruan Jian Xue Bao/Journal of Software, vol. 21, no. 1, pp. 163–176, 2010. View at Publisher · View at Google Scholar · View at Scopus
  42. L. F. Perrone and S. C. Nelson, “A study of on-off attack models for wireless ad hoc networks,” in Proceedings of the 2006 1st Workshop on Operator-Assisted (Wireless-Mesh) Community Networks, OpComm 2006, deu, September 2006. View at Publisher · View at Google Scholar · View at Scopus